CVSS 3.1 Score 7.2 of 10 (high)


Published Dec 18, 2023
Updated: Dec 21, 2023


CVE-2023-6222 is a vulnerability in the Quttera Web Malware Scanner WordPress plugin before version that allows users with an admin role to perform path traversal attacks due to a lack of validation on user input used in a path. This vulnerability affects multiple products, including t4aRmi, t4aRmj, t4aRmg, t4aRmh, t4aRmm, t4aRmn, t4aRmk, t4aRml, t4aRmq, t4aRmr, t4aRmo, t4aRmp, t4aRms, and t4aRmt. To remediate this vulnerability and protect organizations from potential danger, it is recommended to update the Quttera Web Malware Scanner WordPress plugin to version or later. The National Vulnerability Database (NVD) has assigned a high base severity score of 7.2 to this vulnerability due to its potential impact on confidentiality and integrity of the affected systems.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-6222 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options